A Decentralized Technology Model Incorporating Reinforcement Learning for Protected and Energy-Conserving Infrastructures

Author:   Custos Veritatis Leo
Publisher:   Hussaini Begum
ISBN:  

9798230156567


Pages:   156
Publication Date:   09 April 2025
Format:   Paperback
Availability:   Available To Order   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Our Price $87.12 Quantity:  
Add to Cart

Share |

A Decentralized Technology Model Incorporating Reinforcement Learning for Protected and Energy-Conserving Infrastructures


Overview

In Wireless Sensor Networks, nodes are deployed randomly throughout the network and these nodes work without human intervention. Sensor devices can be moni- tored remotely by authorized persons only but sometimes hackers attack to destroy or steal data from the network. Sensor nodes are connected in such a way that they can broadcast data in the network according to the routing algorithm in an appropri- ate manner. WSN itself has many limitations such as sensor devices present in the network having less storage capacity and low battery backup. Security and power constraints are the main concerns in wireless sensor networks. Sensor nodes can be deployed in inaccessible areas to study its various factors. WSNs are widely used systems throughout the world nowadays. For instance, no- table WSN applications are military, healthcare, environmental, traffic control, ed- ucation, and home care. In healthcare, nodes are deployed on the body of the patient so that a doctor can monitor and diagnose the illness. The defense forces utilize sen- sor devices to control and monitor the suspected activities in the territory. In WSNs, data nodes themselves are the routers where transmission is done in multi-hops to reach the data packet to its final destination and these sensor nodes carry vulnerable data that can be attacked and destroyed by the wrongdoers. Data transmitted by the sensor nodes is all in the air and prone to attacks. Furthermore, sensor nodes can fail at any point of transmission in the network because of their low energy constraint.

Full Product Details

Author:   Custos Veritatis Leo
Publisher:   Hussaini Begum
Imprint:   Hussaini Begum
Dimensions:   Width: 21.60cm , Height: 0.80cm , Length: 27.90cm
Weight:   0.376kg
ISBN:  

9798230156567


Pages:   156
Publication Date:   09 April 2025
Audience:   General/trade ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   Available To Order   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Table of Contents

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

MRGC26

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List